Vehicle Survivability and Travel Mileage Schedules

Vehicle Survivability and Travel Mileage Schedules
Author: National Highway Traffic Safety Administration
Publisher:
Total Pages: 42
Release: 2013-09-14
Genre:
ISBN: 9781492394204

This document serves to update the 1995 document of the same title. In this revision, the authors attempt to retain the methodology as much as possible from the previous release. Regardless, some changes were introduced in this updated analysis when needed. In this revision, the authors find that passenger cars and light trucks are being driven farther in their lifetimes (approximately 26,000 miles more per vehicle class). However, whereas younger passenger cars (less than 20 years old) are surviving slightly longer relative to the previous study, light trucks are not surviving as long as before early on in their existence, presumably due to the fact that they are being used more often as passenger vehicles than strictly for cargo.

Computer Security

Computer Security
Author: Sokratis K. Katsikas
Publisher: Springer
Total Pages: 233
Release: 2019-01-30
Genre: Computers
ISBN: 3030127869

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.